Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7645 (GCVE-0-2017-7645)
Vulnerability from cvelistv5
Published
2017-04-18 14:00
Modified
2024-08-05 16:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:12:27.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "name": "RHSA-2017:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "USN-3754-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3754-1/" }, { "name": "RHSA-2017:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2018:1319", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "97950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97950" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "name": "DSA-3886", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-30T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "name": "RHSA-2017:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "USN-3754-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3754-1/" }, { "name": "RHSA-2017:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2018:1319", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "97950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97950" }, { "tags": [ "x_refsource_MISC" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "name": "DSA-3886", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2", "refsource": "MISC", "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "USN-3754-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3754-1/" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "97950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97950" }, { "name": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2", "refsource": "MISC", "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "name": "DSA-3886", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7645", "datePublished": "2017-04-18T14:00:00", "dateReserved": "2017-04-10T00:00:00", "dateUpdated": "2024-08-05T16:12:27.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7645\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-18T14:59:00.213\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.\"},{\"lang\":\"es\",\"value\":\"El servidor NFSv2/NFSv3 en el subsistema nfsd en el Kernel de Linux hasta la versi\u00f3n 4.10.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de una respuesta RPC larga, relacionada con net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c y fs/nfsd/nfsxdr.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.89\",\"matchCriteriaId\":\"9A5C1F01-214B-4477-A3A1-F6DF10181D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.10.107\",\"matchCriteriaId\":\"314F9C88-C8E1-46EF-8119-538C824ED137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.74\",\"matchCriteriaId\":\"75647580-464B-4AEF-8DE2-F17D1748F182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.16.44\",\"matchCriteriaId\":\"50A4478F-EC43-46DF-AE23-9298AE3F8892\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.52\",\"matchCriteriaId\":\"8104AAC1-9700-4372-8E11-37B09309A76F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.1.40\",\"matchCriteriaId\":\"70E79011-B658-40F2-B406-D3619DEBFACD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.66\",\"matchCriteriaId\":\"BF5669AA-0250-493C-9D38-F0B563103943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.26\",\"matchCriteriaId\":\"92A58CFB-13B7-4E99-8A14-A0308E4F126A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.10.14\",\"matchCriteriaId\":\"90895EF1-9DC7-4E47-A937-405661F7A44B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97950\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1615\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1616\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1647\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1319\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3754-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1319\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3754-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2017:2091-1
Vulnerability from csaf_suse
Published
2017-08-08 07:27
Modified
2017-08-08 07:27
Summary
Security update for Linux Kernel Live Patch 14 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 14 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.69-60_64_35 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1294,SUSE-SLE-SERVER-12-SP1-2017-1294
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 14 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.69-60_64_35 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1294,SUSE-SLE-SERVER-12-SP1-2017-1294", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2091-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2091-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172091-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2091-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 14 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-08T07:27:31Z", "generator": { "date": "2017-08-08T07:27:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2091-1", "initial_release_date": "2017-08-08T07:27:31Z", "revision_history": [ { "date": "2017-08-08T07:27:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:31Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:31Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:31Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:31Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2475-1
Vulnerability from csaf_suse
Published
2017-09-14 16:30
Modified
2017-09-14 16:30
Summary
Security update for Linux Kernel Live Patch 25 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 25 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_86 fixes several issues.
The following security bugs were fixed:
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).
Patchnames
SUSE-SLE-SERVER-12-2017-1542
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 25 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_86 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1542", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2475-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2475-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172475-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2475-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1052311", "url": "https://bugzilla.suse.com/1052311" }, { "category": "self", "summary": "SUSE Bug 1052368", "url": "https://bugzilla.suse.com/1052368" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000112 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 25 for SLE 12", "tracking": { "current_release_date": "2017-09-14T16:30:59Z", "generator": { "date": "2017-09-14T16:30:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2475-1", "initial_release_date": "2017-09-14T16:30:59Z", "revision_history": [ { "date": "2017-09-14T16:30:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000112" } ], "notes": [ { "category": "general", "text": "Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-\u003elen becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-\u003elen - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (\"[IPv4/IPv6]: UFO Scatter-gather approach\") on Oct 18 2005.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000112", "url": "https://www.suse.com/security/cve/CVE-2017-1000112" }, { "category": "external", "summary": "SUSE Bug 1052311 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052311" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052365" }, { "category": "external", "summary": "SUSE Bug 1052368 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052368" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:30:59Z", "details": "important" } ], "title": "CVE-2017-1000112" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:30:59Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_86-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:30:59Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2064-1
Vulnerability from csaf_suse
Published
2017-08-07 08:08
Modified
2017-08-07 08:08
Summary
Security update for Linux Kernel Live Patch 7 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.59-92_17 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
The following non-security bug was fixed:
- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON's from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)
Patchnames
SUSE-SLE-Live-Patching-12-2017-1266
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_17 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n\nThe following non-security bug was fixed:\n\n- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON\u0027s from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1266", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2064-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2064-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172064-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2064-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1047518", "url": "https://bugzilla.suse.com/1047518" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:08:22Z", "generator": { "date": "2017-08-07T08:08:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2064-1", "initial_release_date": "2017-08-07T08:08:22Z", "revision_history": [ { "date": "2017-08-07T08:08:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_17-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:22Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2099-1
Vulnerability from csaf_suse
Published
2017-08-08 11:32
Modified
2017-08-08 11:32
Summary
Security update for Linux Kernel Live Patch 16 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 16 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_57 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1304,SUSE-SLE-SERVER-12-2017-1304
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 16 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_57 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1304,SUSE-SLE-SERVER-12-2017-1304", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2099-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2099-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172099-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2099-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 16 for SLE 12", "tracking": { "current_release_date": "2017-08-08T11:32:05Z", "generator": { "date": "2017-08-08T11:32:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2099-1", "initial_release_date": "2017-08-08T11:32:05Z", "revision_history": [ { "date": "2017-08-08T11:32:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:32:05Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:32:05Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:32:05Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:32:05Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2096-1
Vulnerability from csaf_suse
Published
2017-08-08 09:29
Modified
2017-08-08 09:29
Summary
Security update for Linux Kernel Live Patch 19 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 19 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_66 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1298,SUSE-SLE-SERVER-12-2017-1298
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 19 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_66 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1298,SUSE-SLE-SERVER-12-2017-1298", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2096-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2096-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172096-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2096-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1044878", "url": "https://bugzilla.suse.com/1044878" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 19 for SLE 12", "tracking": { "current_release_date": "2017-08-08T09:29:22Z", "generator": { "date": "2017-08-08T09:29:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2096-1", "initial_release_date": "2017-08-08T09:29:22Z", "revision_history": [ { "date": "2017-08-08T09:29:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:22Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:22Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:22Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:22Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2070-1
Vulnerability from csaf_suse
Published
2017-08-07 08:08
Modified
2017-08-07 08:08
Summary
Security update for Linux Kernel Live Patch 6 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 6 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.49-92_14 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1265
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.49-92_14 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1265", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2070-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2070-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172070-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2070-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:08:15Z", "generator": { "date": "2017-08-07T08:08:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2070-1", "initial_release_date": "2017-08-07T08:08:15Z", "revision_history": [ { "date": "2017-08-07T08:08:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64", "product_id": "kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_14-default-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:15Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2068-1
Vulnerability from csaf_suse
Published
2017-08-07 08:45
Modified
2017-08-07 08:45
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-84 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1271
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-84 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1271", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2068-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2068-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172068-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2068-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:45:39Z", "generator": { "date": "2017-08-07T08:45:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2068-1", "initial_release_date": "2017-08-07T08:45:39Z", "revision_history": [ { "date": "2017-08-07T08:45:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-84-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-84-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_21-84-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-84-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-84-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-84-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:39Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2102-1
Vulnerability from csaf_suse
Published
2017-08-08 11:31
Modified
2017-08-08 11:31
Summary
Security update for Linux Kernel Live Patch 22 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 22 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_77 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1301,SUSE-SLE-SERVER-12-2017-1301
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 22 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_77 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1301,SUSE-SLE-SERVER-12-2017-1301", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2102-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2102-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172102-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2102-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 22 for SLE 12", "tracking": { "current_release_date": "2017-08-08T11:31:39Z", "generator": { "date": "2017-08-08T11:31:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2102-1", "initial_release_date": "2017-08-08T11:31:39Z", "revision_history": [ { "date": "2017-08-08T11:31:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:39Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:39Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_77-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:39Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2065-1
Vulnerability from csaf_suse
Published
2017-08-07 08:08
Modified
2017-08-07 08:08
Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.38-93 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1267
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.38-93 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1267", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2065-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2065-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172065-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2065-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:08:28Z", "generator": { "date": "2017-08-07T08:08:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2065-1", "initial_release_date": "2017-08-07T08:08:28Z", "revision_history": [ { "date": "2017-08-07T08:08:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_38-93-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_38-93-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_38-93-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_38-93-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_38-93-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_38-93-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:28Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2476-1
Vulnerability from csaf_suse
Published
2017-09-14 16:31
Modified
2017-09-14 16:31
Summary
Security update for Linux Kernel Live Patch 26 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 26 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_89 fixes several issues.
The following security bugs were fixed:
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).
Patchnames
SUSE-SLE-SERVER-12-2017-1543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 26 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_89 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1543", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2476-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2476-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172476-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2476-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1052311", "url": "https://bugzilla.suse.com/1052311" }, { "category": "self", "summary": "SUSE Bug 1052368", "url": "https://bugzilla.suse.com/1052368" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000112 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 26 for SLE 12", "tracking": { "current_release_date": "2017-09-14T16:31:05Z", "generator": { "date": "2017-09-14T16:31:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2476-1", "initial_release_date": "2017-09-14T16:31:05Z", "revision_history": [ { "date": "2017-09-14T16:31:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000112" } ], "notes": [ { "category": "general", "text": "Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-\u003elen becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-\u003elen - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (\"[IPv4/IPv6]: UFO Scatter-gather approach\") on Oct 18 2005.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000112", "url": "https://www.suse.com/security/cve/CVE-2017-1000112" }, { "category": "external", "summary": "SUSE Bug 1052311 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052311" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052365" }, { "category": "external", "summary": "SUSE Bug 1052368 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052368" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:31:05Z", "details": "important" } ], "title": "CVE-2017-1000112" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:31:05Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_89-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-14T16:31:05Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2063-1
Vulnerability from csaf_suse
Published
2017-08-07 08:27
Modified
2017-08-07 08:27
Summary
Security update for Linux Kernel Live Patch 5 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.49-92_11 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1269
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.49-92_11 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1269", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2063-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2063-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172063-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2063-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:27:33Z", "generator": { "date": "2017-08-07T08:27:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2063-1", "initial_release_date": "2017-08-07T08:27:33Z", "revision_history": [ { "date": "2017-08-07T08:27:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64", "product_id": "kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_49-92_11-default-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:27:33Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2092-1
Vulnerability from csaf_suse
Published
2017-08-08 07:27
Modified
2017-08-08 07:27
Summary
Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 13 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.69-60_64_32 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1293,SUSE-SLE-SERVER-12-SP1-2017-1293
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 13 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.69-60_64_32 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1293,SUSE-SLE-SERVER-12-SP1-2017-1293", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2092-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2092-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172092-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2092-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 13 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-08T07:27:24Z", "generator": { "date": "2017-08-08T07:27:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2092-1", "initial_release_date": "2017-08-08T07:27:24Z", "revision_history": [ { "date": "2017-08-08T07:27:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:24Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:24Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:24Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:24Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_32-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:24Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2095-1
Vulnerability from csaf_suse
Published
2017-08-08 09:29
Modified
2017-08-08 09:29
Summary
Security update for Linux Kernel Live Patch 18 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 18 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_63 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1297,SUSE-SLE-SERVER-12-2017-1297
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 18 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_63 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1297,SUSE-SLE-SERVER-12-2017-1297", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2095-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2095-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172095-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2095-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 18 for SLE 12", "tracking": { "current_release_date": "2017-08-08T09:29:14Z", "generator": { "date": "2017-08-08T09:29:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2095-1", "initial_release_date": "2017-08-08T09:29:14Z", "revision_history": [ { "date": "2017-08-08T09:29:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:14Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:14Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:14Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_63-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:14Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2049-1
Vulnerability from csaf_suse
Published
2017-08-04 20:31
Modified
2017-08-04 20:31
Summary
Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.69-60_64_29 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1261,SUSE-SLE-SERVER-12-SP1-2017-1261
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 12 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.69-60_64_29 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1261,SUSE-SLE-SERVER-12-SP1-2017-1261", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2049-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2049-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172049-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2049-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 12 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-04T20:31:52Z", "generator": { "date": "2017-08-04T20:31:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2049-1", "initial_release_date": "2017-08-04T20:31:52Z", "revision_history": [ { "date": "2017-08-04T20:31:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T20:31:52Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T20:31:52Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T20:31:52Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T20:31:52Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_69-60_64_29-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T20:31:52Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2497-1
Vulnerability from csaf_suse
Published
2017-09-15 12:34
Modified
2017-09-15 12:34
Summary
Security update for Linux Kernel Live Patch 24 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 24 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_83 fixes several issues.
The following security bugs were fixed:
- CVE-2017-1000112: Prevent a race condition in net-packet code that could have been exploited by unprivileged users to gain root access (bsc#1052368).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SERVER-12-2017-1547
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 24 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_83 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-1000112: Prevent a race condition in net-packet code that could have been exploited by unprivileged users to gain root access (bsc#1052368).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1547", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2497-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2497-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172497-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2497-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1052311", "url": "https://bugzilla.suse.com/1052311" }, { "category": "self", "summary": "SUSE Bug 1052368", "url": "https://bugzilla.suse.com/1052368" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000112 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 24 for SLE 12", "tracking": { "current_release_date": "2017-09-15T12:34:26Z", "generator": { "date": "2017-09-15T12:34:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2497-1", "initial_release_date": "2017-09-15T12:34:26Z", "revision_history": [ { "date": "2017-09-15T12:34:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64", "product_id": "kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000112" } ], "notes": [ { "category": "general", "text": "Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-\u003elen becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-\u003elen - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (\"[IPv4/IPv6]: UFO Scatter-gather approach\") on Oct 18 2005.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000112", "url": "https://www.suse.com/security/cve/CVE-2017-1000112" }, { "category": "external", "summary": "SUSE Bug 1052311 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052311" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052365" }, { "category": "external", "summary": "SUSE Bug 1052368 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052368" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-15T12:34:26Z", "details": "important" } ], "title": "CVE-2017-1000112" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-15T12:34:26Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-default-2-2.2.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_83-xen-2-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-15T12:34:26Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2061-1
Vulnerability from csaf_suse
Published
2017-08-07 09:53
Modified
2017-08-07 09:53
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1273,SUSE-SLE-SERVER-12-SP1-2017-1273
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.67-60_64_18 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1273,SUSE-SLE-SERVER-12-SP1-2017-1273", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2061-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2061-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172061-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2061-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-07T09:53:16Z", "generator": { "date": "2017-08-07T09:53:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2061-1", "initial_release_date": "2017-08-07T09:53:16Z", "revision_history": [ { "date": "2017-08-07T09:53:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:16Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:16Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:16Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:16Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-default-9-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_18-xen-9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:16Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2775-1
Vulnerability from csaf_suse
Published
2017-10-19 08:52
Modified
2017-10-19 08:52
Summary
Security update for Linux Kernel Live Patch 27 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 27 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_92 fixes several issues.
The following security bugs were fixed:
- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call (bsc#1045327).
- CVE-2017-1000112: Updated patch for this issue to be in sync with the other livepatches. Description of the issue: Prevent race condition in net-packet code that could have been exploited by unprivileged users to gain root access (bsc#1052368, bsc#1052311).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).
Patchnames
SUSE-SLE-SERVER-12-2017-1716
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 27 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_92 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-15274: security/keys/keyctl.c in the Linux kernel did not consider the case of a NULL payload in conjunction with a nonzero length value, which allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call (bsc#1045327).\n- CVE-2017-1000112: Updated patch for this issue to be in sync with the other livepatches. Description of the issue: Prevent race condition in net-packet code that could have been exploited by unprivileged users to gain root access (bsc#1052368, bsc#1052311).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c was too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem allowed remote attackers to cause a denial of service (system crash) via a long RPC reply (bsc#1046191).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2017-1716", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2775-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2775-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172775-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2775-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1045327", "url": "https://bugzilla.suse.com/1045327" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1052311", "url": "https://bugzilla.suse.com/1052311" }, { "category": "self", "summary": "SUSE Bug 1052368", "url": "https://bugzilla.suse.com/1052368" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000112 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15274 page", "url": "https://www.suse.com/security/cve/CVE-2017-15274/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 27 for SLE 12", "tracking": { "current_release_date": "2017-10-19T08:52:24Z", "generator": { "date": "2017-10-19T08:52:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2775-1", "initial_release_date": "2017-10-19T08:52:24Z", "revision_history": [ { "date": "2017-10-19T08:52:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000112" } ], "notes": [ { "category": "general", "text": "Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-\u003elen becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-\u003elen - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 (\"[IPv4/IPv6]: UFO Scatter-gather approach\") on Oct 18 2005.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000112", "url": "https://www.suse.com/security/cve/CVE-2017-1000112" }, { "category": "external", "summary": "SUSE Bug 1052311 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052311" }, { "category": "external", "summary": "SUSE Bug 1052365 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052365" }, { "category": "external", "summary": "SUSE Bug 1052368 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1052368" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000112", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-19T08:52:24Z", "details": "important" } ], "title": "CVE-2017-1000112" }, { "cve": "CVE-2017-15274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15274" } ], "notes": [ { "category": "general", "text": "security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15274", "url": "https://www.suse.com/security/cve/CVE-2017-15274" }, { "category": "external", "summary": "SUSE Bug 1045327 for CVE-2017-15274", "url": "https://bugzilla.suse.com/1045327" }, { "category": "external", "summary": "SUSE Bug 1062471 for CVE-2017-15274", "url": "https://bugzilla.suse.com/1062471" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-19T08:52:24Z", "details": "low" } ], "title": "CVE-2017-15274" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-19T08:52:24Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-default-2-4.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_92-xen-2-4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-19T08:52:24Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2062-1
Vulnerability from csaf_suse
Published
2017-08-07 07:09
Modified
2017-08-07 07:09
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-69 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1263
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-69 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1263", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2062-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2062-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172062-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2062-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T07:09:03Z", "generator": { "date": "2017-08-07T07:09:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2062-1", "initial_release_date": "2017-08-07T07:09:03Z", "revision_history": [ { "date": "2017-08-07T07:09:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64", "product_id": "kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-69-default-8-18.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T07:09:03Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2072-1
Vulnerability from csaf_suse
Published
2017-08-07 12:01
Modified
2017-08-07 12:01
Summary
Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1276,SUSE-SLE-SERVER-12-SP1-2017-1276
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 10 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1276,SUSE-SLE-SERVER-12-SP1-2017-1276", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2072-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2072-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172072-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2072-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 10 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-07T12:01:44Z", "generator": { "date": "2017-08-07T12:01:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2072-1", "initial_release_date": "2017-08-07T12:01:44Z", "revision_history": [ { "date": "2017-08-07T12:01:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:44Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:44Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:44Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:44Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-default-8-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_21-xen-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:44Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2088-1
Vulnerability from csaf_suse
Published
2017-08-08 07:27
Modified
2017-08-08 07:27
Summary
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 8 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1295,SUSE-SLE-SERVER-12-SP1-2017-1295
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.62-60_64_8 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1295,SUSE-SLE-SERVER-12-SP1-2017-1295", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2088-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2088-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172088-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2088-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-08T07:27:40Z", "generator": { "date": "2017-08-08T07:27:40Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2088-1", "initial_release_date": "2017-08-08T07:27:40Z", "revision_history": [ { "date": "2017-08-08T07:27:40Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:40Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:40Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:40Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:40Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_64_8-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T07:27:40Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2060-1
Vulnerability from csaf_suse
Published
2017-08-07 09:53
Modified
2017-08-07 09:53
Summary
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_62 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1274,SUSE-SLE-SERVER-12-SP1-2017-1274
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.62-60_62 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1274,SUSE-SLE-SERVER-12-SP1-2017-1274", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2060-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2060-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172060-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2060-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-07T09:53:24Z", "generator": { "date": "2017-08-07T09:53:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2060-1", "initial_release_date": "2017-08-07T09:53:24Z", "revision_history": [ { "date": "2017-08-07T09:53:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:24Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:24Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:24Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:24Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-default-10-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_62-60_62-xen-10-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T09:53:24Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2043-1
Vulnerability from csaf_suse
Published
2017-08-04 15:09
Modified
2017-08-04 15:09
Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-90 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1257
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-90 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1257", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2043-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2043-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172043-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2043-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-04T15:09:11Z", "generator": { "date": "2017-08-04T15:09:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2043-1", "initial_release_date": "2017-08-04T15:09:11Z", "revision_history": [ { "date": "2017-08-04T15:09:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-90-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-90-default-7-2.1.x86_64", "product_id": "kgraft-patch-4_4_21-90-default-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-90-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-90-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-90-default-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:09:11Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2093-1
Vulnerability from csaf_suse
Published
2017-08-08 09:29
Modified
2017-08-08 09:29
Summary
Security update for Linux Kernel Live Patch 17 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 17 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_60 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1296,SUSE-SLE-SERVER-12-2017-1296
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 17 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_60 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1296,SUSE-SLE-SERVER-12-2017-1296", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2093-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2093-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172093-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2093-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 17 for SLE 12", "tracking": { "current_release_date": "2017-08-08T09:29:06Z", "generator": { "date": "2017-08-08T09:29:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2093-1", "initial_release_date": "2017-08-08T09:29:06Z", "revision_history": [ { "date": "2017-08-08T09:29:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:06Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:06Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:06Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_60-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T09:29:06Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2098-1
Vulnerability from csaf_suse
Published
2017-08-08 11:31
Modified
2017-08-08 11:31
Summary
Security update for Linux Kernel Live Patch 23 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 23 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_80 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1300,SUSE-SLE-SERVER-12-2017-1300
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 23 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_80 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1300,SUSE-SLE-SERVER-12-2017-1300", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2098-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2098-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172098-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2098-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 23 for SLE 12", "tracking": { "current_release_date": "2017-08-08T11:31:30Z", "generator": { "date": "2017-08-08T11:31:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2098-1", "initial_release_date": "2017-08-08T11:31:30Z", "revision_history": [ { "date": "2017-08-08T11:31:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:30Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:30Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-default-2-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_80-xen-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:30Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:1360-1
Vulnerability from csaf_suse
Published
2017-05-19 12:12
Modified
2017-05-19 12:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes.
Notable new/improved features:
- Improved support for Hyper-V
- Support for the tcp_westwood TCP scheduling algorithm
The following security bugs were fixed:
- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type. (bsc#1029850).
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593)
- CVE-2016-9604: This fixes handling of keyrings starting with '.' in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576)
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)
- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703).
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)
- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).
- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762).
- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)
- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842)
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).
- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).
- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).
- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190)
- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)
- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697)
- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077).
The following non-security bugs were fixed:
- ACPI / APEI: Fix NMI notification handling (bsc#917630).
- arch: Mass conversion of smp_mb__*() (bsc#1020795).
- asm-generic: add __smp_xxx wrappers (bsc#1020795).
- block: remove struct request buffer member (bsc#1020795).
- block: submit_bio_wait() conversions (bsc#1020795).
- bonding: Advertize vxlan offload features when supported (bsc#1009682).
- bonding: handle more gso types (bsc#1009682).
- bonding: use the correct ether type for alb (bsc#1028595).
- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).
- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- btrfs: make file clone aware of fatal signals (bsc#1015787).
- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).
- cancel the setfilesize transation when io error happen (bsc#1028648).
- cgroup: remove stray references to css_id (bsc#1020795).
- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164).
- dm: add era target (bsc#1020795).
- dm: allow remove to be deferred (bsc#1020795).
- dm bitset: only flush the current word if it has been dirtied (bsc#1020795).
- dm btree: add dm_btree_find_lowest_key (bsc#1020795).
- dm cache: actually resize cache (bsc#1020795).
- dm cache: add block sizes and total cache blocks to status output (bsc#1020795).
- dm cache: add cache block invalidation support (bsc#1020795).
- dm cache: add passthrough mode (bsc#1020795).
- dm cache: add policy name to status output (bsc#1020795).
- dm cache: add remove_cblock method to policy interface (bsc#1020795).
- dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795).
- dm cache: cache shrinking support (bsc#1020795).
- dm cache: do not add migration to completed list before unhooking bio (bsc#1020795).
- dm cache: fix a lock-inversion (bsc#1020795).
- dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795).
- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).
- dm cache: improve efficiency of quiescing flag management (bsc#1020795).
- dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795).
- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).
- dm cache metadata: check the metadata version when reading the superblock (bsc#1020795).
- dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795).
- dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795).
- dm cache: optimize commit_if_needed (bsc#1020795).
- dm cache policy mq: a few small fixes (bsc#1020795).
- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).
- dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795).
- dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795).
- dm cache policy mq: protect residency method with existing mutex (bsc#1020795).
- dm cache policy mq: reduce memory requirements (bsc#1020795).
- dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795).
- dm cache policy: remove return from void policy_remove_mapping (bsc#1020795).
- dm cache: promotion optimisation for writes (bsc#1020795).
- dm cache: resolve small nits and improve Documentation (bsc#1020795).
- dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795).
- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).
- dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795).
- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).
- dm crypt: properly handle extra key string in initialization (bsc#1020795).
- dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795).
- dm: fix Kconfig indentation (bsc#1020795).
- dm: fix Kconfig menu indentation (bsc#1020795).
- dm: make dm_table_alloc_md_mempools static (bsc#1020795).
- dm mpath: do not call pg_init when it is already running (bsc#1020795).
- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).
- dm mpath: print more useful warnings in multipath_message() (bsc#1020795).
- dm mpath: push back requests instead of queueing (bsc#1020795).
- dm mpath: really fix lockdep warning (bsc#1020795).
- dm mpath: reduce memory pressure when requeuing (bsc#1020795).
- dm mpath: remove extra nesting in map function (bsc#1020795).
- dm mpath: remove map_io() (bsc#1020795).
- dm mpath: remove process_queued_ios() (bsc#1020795).
- dm mpath: requeue I/O during pg_init (bsc#1020795).
- dm persistent data: cleanup dm-thin specific references in text (bsc#1020795).
- dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795).
- dm snapshot: fix metadata corruption (bsc#1020795).
- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).
- dm snapshot: use dm-bufio (bsc#1020795).
- dm snapshot: use dm-bufio prefetch (bsc#1020795).
- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).
- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).
- dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795).
- dm: stop using bi_private (bsc#1020795).
- dm table: add dm_table_run_md_queue_async (bsc#1020795).
- dm table: print error on preresume failure (bsc#1020795).
- dm table: remove unused buggy code that extends the targets array (bsc#1020795).
- dm thin: add error_if_no_space feature (bsc#1020795).
- dm thin: add mappings to end of prepared_* lists (bsc#1020795).
- dm thin: add 'no_space_timeout' dm-thin-pool module param (bsc#1020795).
- dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795).
- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795).
- dm thin: allow metadata space larger than supported to go unused (bsc#1020795).
- dm thin: cleanup and improve no space handling (bsc#1020795).
- dm thin: eliminate the no_free_space flag (bsc#1020795).
- dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795).
- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).
- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).
- dm thin: fix noflush suspend IO queueing (bsc#1020795).
- dm thin: fix out of data space handling (bsc#1020795).
- dm thin: fix pool feature parsing (bsc#1020795).
- dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795).
- dm thin: handle metadata failures more consistently (bsc#1020795).
- dm thin: irqsave must always be used with the pool->lock spinlock (bsc#1020795).
- dm thin: log info when growing the data or metadata device (bsc#1020795).
- dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795).
- dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795).
- dm thin: simplify pool_is_congested (bsc#1020795).
- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).
- dm thin: synchronize the pool mode during suspend (bsc#1020795).
- dm thin: use bool rather than unsigned for flags in structures (bsc#1020795).
- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795).
- dm thin: use per thin device deferred bio lists (bsc#1020795).
- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795).
- drm/i915: relax uncritical udelay_range() (bsc#1038261).
- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).
- ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985).
- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
- ext4: mark inode dirty after converting inline directory (bsc#1012985).
- ftrace: Make ftrace_location_range() global (FATE#322421).
- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).
- hv: util: catch allocation errors
- hv: utils: use memdup_user in hvt_op_write
- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).
- i40e: avoid null pointer dereference (bsc#922853).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824).
- iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125).
- ipv6: make ECMP route replacement less greedy (bsc#930399).
- kabi: hide changes in struct sk_buff (bsc#1009682).
- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kABI: protect struct inet6_dev (kabi).
- kABI: protect struct iscsi_conn (bsc#103470).
- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).
- kABI: restore can_rx_register parameters (kabi).
- kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444).
- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
- kgr/module: make a taint flag module-specific
- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition
- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).
- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- l2tp: lock socket before checking flags in connect() (bsc#1028415).
- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).
- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
- md: avoid oops on unload if some process is in poll or select (bsc#1020795).
- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).
- md: ensure metadata is writen after raid level change (bsc#1020795).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md: md_clear_badblocks should return an error code on failure (bsc#1020795).
- md: refuse to change shape of array if it is active but read-only (bsc#1020795).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).
- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).
- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
- mm, memcg: do not retry precharge charges (bnc#1022559).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).
- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).
- module: move add_taint_module() to a header file
- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).
- net: add skb_pop_rcv_encapsulation (bsc#1009682).
- net: Call skb_checksum_init in IPv4 (bsc#1009682).
- net: Call skb_checksum_init in IPv6 (bsc#1009682).
- netfilter: allow logging fron non-init netns (bsc#970083).
- net: Generalize checksum_init functions (bsc#1009682).
- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).
- NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041).
- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).
- NFS: Fix a performance regression in readdir (bsc#857926).
- NFS: flush out dirty data on file fput() (bsc#1021762).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985).
- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
- powerpc: Create a helper for getting the kernel toc value (FATE#322421).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel (FATE#322421).
- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).
- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).
- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
- powerpc/kgraft: Add kgraft header (FATE#322421).
- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).
- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).
- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
- powerpc/module: Mark module stubs with a magic value (FATE#322421).
- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).
- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).
- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).
- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).
- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164).
- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).
- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048).
- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang
- remove mpath patches from dmcache backport, for bsc#1035738
- revert 'procfs: mark thread stack correctly in proc/PID/maps' (bnc#1030901).
- Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
- rtnetlink: allow to register ops without ops->setup set (bsc#1021374).
- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514).
- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).
- scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700).
- scsi: storvsc: fix SRB_STATUS_ABORTED handling
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).
- taint/module: Clean up global and module taint flags handling
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
- treewide: fix 'distingush' typo (bsc#1020795).
- tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795).
- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699).
- usb: host: xhci: print correct command ring address (bnc#1035699).
- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- vfs: Do not exchange 'short' filenames unconditionally (bsc#1012985).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).
- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).
- vxlan: Checksum fixes (bsc#1009682).
- vxlan: GRO support at tunnel layer (bsc#1009682).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).
- xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2017-831,SUSE-SLE-Live-Patching-12-2017-831,SUSE-SLE-Module-Public-Cloud-12-2017-831,SUSE-SLE-SDK-12-SP1-2017-831,SUSE-SLE-SERVER-12-SP1-2017-831,SUSE-SLE-WE-12-SP1-2017-831
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.74 to receive various security and bugfixes.\n\nNotable new/improved features:\n- Improved support for Hyper-V\n- Support for the tcp_westwood TCP scheduling algorithm\n\nThe following security bugs were fixed:\n\n- CVE-2017-8106: The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel allowed privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer (bsc#1035877).\n- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \u0027dead\u0027 type. (bsc#1029850).\n- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c. (bsc#1030593)\n- CVE-2016-9604: This fixes handling of keyrings starting with \u0027.\u0027 in KEYCTL_JOIN_SESSION_KEYRING, which could have allowed local users to manipulate privileged keyrings (bsc#1035576)\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation. (bnc#1033336).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c. (bsc#1034670).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579)\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003)\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440)\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052)\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213)\n- CVE-2016-9588: arch/x86/kvm/vmx.c in the Linux kernel mismanaged the #BP and #OF exceptions, which allowed guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest (bsc#1015703).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415)\n- CVE-2016-10208: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel did not properly validate meta block groups, which allowed physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image (bnc#1023377).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bsc#1023762).\n- CVE-2017-5986: A race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024)\n- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842)\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly managed lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2016-10044: The aio_mount function in fs/aio.c in the Linux kernel did not properly restrict execute access, which made it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call (bnc#1023992).\n- CVE-2016-3070: The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel improperly interacts with mm/migrate.c, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move (bnc#979215).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190)\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189)\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066)\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bsc#1025235).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722)\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697)\n- CVE-2015-1350: The VFS subsystem in the Linux kernel provided an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bsc#914939).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- ACPI / APEI: Fix NMI notification handling (bsc#917630).\n- arch: Mass conversion of smp_mb__*() (bsc#1020795).\n- asm-generic: add __smp_xxx wrappers (bsc#1020795).\n- block: remove struct request buffer member (bsc#1020795).\n- block: submit_bio_wait() conversions (bsc#1020795).\n- bonding: Advertize vxlan offload features when supported (bsc#1009682).\n- bonding: handle more gso types (bsc#1009682).\n- bonding: use the correct ether type for alb (bsc#1028595).\n- btrfs: allow unlink to exceed subvolume quota (bsc#1015821).\n- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1015821).\n- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).\n- btrfs: make file clone aware of fatal signals (bsc#1015787).\n- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1015821).\n- cancel the setfilesize transation when io error happen (bsc#1028648).\n- cgroup: remove stray references to css_id (bsc#1020795).\n- cpuidle: powernv/pseries: Auto-promotion of snooze to deeper idle state (bnc#1023164).\n- dm: add era target (bsc#1020795).\n- dm: allow remove to be deferred (bsc#1020795).\n- dm bitset: only flush the current word if it has been dirtied (bsc#1020795).\n- dm btree: add dm_btree_find_lowest_key (bsc#1020795).\n- dm cache: actually resize cache (bsc#1020795).\n- dm cache: add block sizes and total cache blocks to status output (bsc#1020795).\n- dm cache: add cache block invalidation support (bsc#1020795).\n- dm cache: add passthrough mode (bsc#1020795).\n- dm cache: add policy name to status output (bsc#1020795).\n- dm cache: add remove_cblock method to policy interface (bsc#1020795).\n- dm cache: be much more aggressive about promoting writes to discarded blocks (bsc#1020795).\n- dm cache: cache shrinking support (bsc#1020795).\n- dm cache: do not add migration to completed list before unhooking bio (bsc#1020795).\n- dm cache: fix a lock-inversion (bsc#1020795).\n- dm cache: fix truncation bug when mapping I/O to more than 2TB fast device (bsc#1020795).\n- dm cache: fix writethrough mode quiescing in cache_map (bsc#1020795).\n- dm cache: improve efficiency of quiescing flag management (bsc#1020795).\n- dm cache: io destined for the cache device can now serve as tick bios (bsc#1020795).\n- dm cache: log error message if dm_kcopyd_copy() fails (bsc#1020795).\n- dm cache metadata: check the metadata version when reading the superblock (bsc#1020795).\n- dm cache metadata: return bool from __superblock_all_zeroes (bsc#1020795).\n- dm cache: move hook_info into common portion of per_bio_data structure (bsc#1020795).\n- dm cache: optimize commit_if_needed (bsc#1020795).\n- dm cache policy mq: a few small fixes (bsc#1020795).\n- dm cache policy mq: fix promotions to occur as expected (bsc#1020795).\n- dm cache policy mq: implement writeback_work() and mq_{set,clear}_dirty() (bsc#1020795).\n- dm cache policy mq: introduce three promotion threshold tunables (bsc#1020795).\n- dm cache policy mq: protect residency method with existing mutex (bsc#1020795).\n- dm cache policy mq: reduce memory requirements (bsc#1020795).\n- dm cache policy mq: use list_del_init instead of list_del + INIT_LIST_HEAD (bsc#1020795).\n- dm cache policy: remove return from void policy_remove_mapping (bsc#1020795).\n- dm cache: promotion optimisation for writes (bsc#1020795).\n- dm cache: resolve small nits and improve Documentation (bsc#1020795).\n- dm cache: return -EINVAL if the user specifies unknown cache policy (bsc#1020795).\n- dm cache: use cell_defer() boolean argument consistently (bsc#1020795).\n- dm: change sector_count member in clone_info from sector_t to unsigned (bsc#1020795).\n- dm crypt: add TCW IV mode for old CBC TCRYPT containers (bsc#1020795).\n- dm crypt: properly handle extra key string in initialization (bsc#1020795).\n- dm delay: use per-bio data instead of a mempool and slab cache (bsc#1020795).\n- dm: fix Kconfig indentation (bsc#1020795).\n- dm: fix Kconfig menu indentation (bsc#1020795).\n- dm: make dm_table_alloc_md_mempools static (bsc#1020795).\n- dm mpath: do not call pg_init when it is already running (bsc#1020795).\n- dm mpath: fix lock order inconsistency in multipath_ioctl (bsc#1020795).\n- dm mpath: print more useful warnings in multipath_message() (bsc#1020795).\n- dm mpath: push back requests instead of queueing (bsc#1020795).\n- dm mpath: really fix lockdep warning (bsc#1020795).\n- dm mpath: reduce memory pressure when requeuing (bsc#1020795).\n- dm mpath: remove extra nesting in map function (bsc#1020795).\n- dm mpath: remove map_io() (bsc#1020795).\n- dm mpath: remove process_queued_ios() (bsc#1020795).\n- dm mpath: requeue I/O during pg_init (bsc#1020795).\n- dm persistent data: cleanup dm-thin specific references in text (bsc#1020795).\n- dm snapshot: call destroy_work_on_stack() to pair with INIT_WORK_ONSTACK() (bsc#1020795).\n- dm snapshot: fix metadata corruption (bsc#1020795).\n- dm snapshot: prepare for switch to using dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio (bsc#1020795).\n- dm snapshot: use dm-bufio prefetch (bsc#1020795).\n- dm snapshot: use GFP_KERNEL when initializing exceptions (bsc#1020795).\n- dm space map disk: optimise sm_disk_dec_block (bsc#1020795).\n- dm space map metadata: limit errors in sm_metadata_new_block (bsc#1020795).\n- dm: stop using bi_private (bsc#1020795).\n- dm table: add dm_table_run_md_queue_async (bsc#1020795).\n- dm table: print error on preresume failure (bsc#1020795).\n- dm table: remove unused buggy code that extends the targets array (bsc#1020795).\n- dm thin: add error_if_no_space feature (bsc#1020795).\n- dm thin: add mappings to end of prepared_* lists (bsc#1020795).\n- dm thin: add \u0027no_space_timeout\u0027 dm-thin-pool module param (bsc#1020795).\n- dm thin: add timeout to stop out-of-data-space mode holding IO forever (bsc#1020795).\n- dm thin: allow metadata commit if pool is in PM_OUT_OF_DATA_SPACE mode (bsc#1020795).\n- dm thin: allow metadata space larger than supported to go unused (bsc#1020795).\n- dm thin: cleanup and improve no space handling (bsc#1020795).\n- dm thin: eliminate the no_free_space flag (bsc#1020795).\n- dm thin: ensure user takes action to validate data and metadata consistency (bsc#1020795).\n- dm thin: factor out check_low_water_mark and use bools (bsc#1020795).\n- dm thin: fix deadlock in __requeue_bio_list (bsc#1020795).\n- dm thin: fix noflush suspend IO queueing (bsc#1020795).\n- dm thin: fix out of data space handling (bsc#1020795).\n- dm thin: fix pool feature parsing (bsc#1020795).\n- dm thin: fix rcu_read_lock being held in code that can sleep (bsc#1020795).\n- dm thin: handle metadata failures more consistently (bsc#1020795).\n- dm thin: irqsave must always be used with the pool-\u003elock spinlock (bsc#1020795).\n- dm thin: log info when growing the data or metadata device (bsc#1020795).\n- dm thin: requeue bios to DM core if no_free_space and in read-only mode (bsc#1020795).\n- dm thin: return error from alloc_data_block if pool is not in write mode (bsc#1020795).\n- dm thin: simplify pool_is_congested (bsc#1020795).\n- dm thin: sort the per thin deferred bios using an rb_tree (bsc#1020795).\n- dm thin: synchronize the pool mode during suspend (bsc#1020795).\n- dm thin: use bool rather than unsigned for flags in structures (bsc#1020795).\n- dm thin: use INIT_WORK_ONSTACK in noflush_work to avoid ODEBUG warning (bsc#1020795).\n- dm thin: use per thin device deferred bio lists (bsc#1020795).\n- dm: use RCU_INIT_POINTER instead of rcu_assign_pointer in __unbind (bsc#1020795).\n- drm/i915: relax uncritical udelay_range() (bsc#1038261).\n- ether: add loopback type ETH_P_LOOPBACK (bsc#1028595).\n- ext4: fix bh leak on error paths in ext4_rename() and ext4_cross_rename() (bsc#1012985).\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- ext4: mark inode dirty after converting inline directory (bsc#1012985).\n- ftrace: Make ftrace_location_range() global (FATE#322421).\n- HID: usbhid: improve handling of Clear-Halt and reset (bsc#1031080).\n- hv: util: catch allocation errors\n- hv: utils: use memdup_user in hvt_op_write\n- hwrng: virtio - ensure reads happen after successful probe (bsc#954763 bsc#1032344).\n- i40e: avoid null pointer dereference (bsc#922853).\n- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).\n- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).\n- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).\n- i40e: Impose a lower limit on gso size (bsc#985561).\n- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).\n- iommu/vt-d: Flush old iommu caches for kdump when the device gets context mapped (bsc#1023824).\n- iommu/vt-d: Tylersburg isoch identity map check is done too late (bsc#1032125).\n- ipv6: make ECMP route replacement less greedy (bsc#930399).\n- kabi: hide changes in struct sk_buff (bsc#1009682).\n- KABI: Hide new include in arch/powerpc/kernel/process.c (fate#322421).\n- kABI: mask struct xfs_icdinode change (bsc#1024788).\n- kABI: protect struct inet6_dev (kabi).\n- kABI: protect struct iscsi_conn (bsc#103470).\n- kABI: protect struct xfs_buftarg and struct xfs_mount (bsc#1024508).\n- kABI: restore can_rx_register parameters (kabi).\n- kernel/watchdog: use nmi registers snapshot in hardlockup handler (bsc#940946, bsc#937444).\n- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).\n- kgr/module: make a taint flag module-specific\n- kgr: remove unneeded kgr_needs_lazy_migration() s390x definition\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).\n- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).\n- md: avoid oops on unload if some process is in poll or select (bsc#1020795).\n- md: Convert use of typedef ctl_table to struct ctl_table (bsc#1020795).\n- md: ensure metadata is writen after raid level change (bsc#1020795).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- md: md_clear_badblocks should return an error code on failure (bsc#1020795).\n- md: refuse to change shape of array if it is active but read-only (bsc#1020795).\n- megaraid_sas: add missing curly braces in ioctl handler (bsc#1023207).\n- megaraid_sas: Fixup tgtid count in megasas_ld_list_query() (bsc#971933).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- mm, memcg: do not retry precharge charges (bnc#1022559).\n- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).\n- mm/page_alloc: fix nodes for reclaim in fast path (bnc#1031842).\n- module: move add_taint_module() to a header file\n- net: Add skb_gro_postpull_rcsum to udp and vxlan (bsc#1009682).\n- net: add skb_pop_rcv_encapsulation (bsc#1009682).\n- net: Call skb_checksum_init in IPv4 (bsc#1009682).\n- net: Call skb_checksum_init in IPv6 (bsc#1009682).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- net: Generalize checksum_init functions (bsc#1009682).\n- net: Preserve CHECKSUM_COMPLETE at validation (bsc#1009682).\n- NFS: do not try to cross a mountpount when there isn\u0027t one there (bsc#1028041).\n- NFS: Expedite unmount of NFS auto-mounts (bnc#1025802).\n- NFS: Fix a performance regression in readdir (bsc#857926).\n- NFS: flush out dirty data on file fput() (bsc#1021762).\n- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1012985).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Create a helper for getting the kernel toc value (FATE#322421).\n- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).\n- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).\n- powerpc/fadump: Update fadump documentation (bsc#1032141).\n- powerpc/ftrace: Add Kconfig \u0026 Make glue for mprofile-kernel (FATE#322421).\n- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).\n- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).\n- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).\n- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).\n- powerpc/kgraft: Add kgraft header (FATE#322421).\n- powerpc/kgraft: Add kgraft stack to struct thread_info (FATE#322421).\n- powerpc/kgraft: Add live patching support on ppc64le (FATE#322421).\n- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).\n- powerpc/module: Mark module stubs with a magic value (FATE#322421).\n- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).\n- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).\n- powerpc/prom: Increase minimum RMA size to 512MB (bsc#984530).\n- powerpc/pseries/cpuidle: Remove MAX_IDLE_STATE macro (bnc#1023164).\n- powerpc/pseries/cpuidle: Use cpuidle_register() for initialisation (bnc#1023164).\n- powerpc: Reject binutils 2.24 when building little endian (boo#1028895).\n- RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1020048).\n- raid1: include bio_end_io_list in nr_queued to prevent freeze_array hang\n- remove mpath patches from dmcache backport, for bsc#1035738\n- revert \u0027procfs: mark thread stack correctly in proc/PID/maps\u0027 (bnc#1030901).\n- Revert \u0027RDMA/core: Fix incorrect structure packing for booleans\u0027 (kabi).\n- rtnetlink: allow to register ops without ops-\u003esetup set (bsc#1021374).\n- s390/zcrypt: Introduce CEX6 toleration (FATE#321783, LTC#147506, bsc#1019514).\n- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).\n- scsi: libiscsi: add lock around task lists to fix list corruption regression (bsc#1034700).\n- scsi: storvsc: fix SRB_STATUS_ABORTED handling\n- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).\n- svcrpc: fix gss-proxy NULL dereference in some error cases (bsc#1024309).\n- taint/module: Clean up global and module taint flags handling\n- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).\n- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).\n- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).\n- treewide: fix \u0027distingush\u0027 typo (bsc#1020795).\n- tree-wide: use reinit_completion instead of INIT_COMPLETION (bsc#1020795).\n- usb: dwc3: gadget: Fix incorrect DEPCMD and DGCMD status macros (bsc#1035699).\n- usb: host: xhci: print correct command ring address (bnc#1035699).\n- USB: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- vfs: Do not exchange \u0027short\u0027 filenames unconditionally (bsc#1012985).\n- vfs: split generic splice code from i_mutex locking (bsc#1024788).\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- VSOCK: Detach QP check should filter out non matching QPs (bsc#1036752).\n- vxlan: cancel sock_work in vxlan_dellink() (bsc#1031567).\n- vxlan: Checksum fixes (bsc#1009682).\n- vxlan: GRO support at tunnel layer (bsc#1009682).\n- xen-blkfront: correct maximum segment accounting (bsc#1018263).\n- xen-blkfront: do not call talk_to_blkback when already connected to blkback.\n- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: do not allow di_size with high bit set (bsc#1024234).\n- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).\n- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).\n- xfs: fix broken multi-fsb buffer logging (bsc#1024081).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n- xfs: Fix lock ordering in splice write (bsc#1024788).\n- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\n- xfs: Make xfs_icdinode-\u003edi_dmstate atomic_t (bsc#1024788).\n- xfs: pass total block res. as total xfs_bmapi_write() parameter (bsc#1029470).\n- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).\n- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-831,SUSE-SLE-Live-Patching-12-2017-831,SUSE-SLE-Module-Public-Cloud-12-2017-831,SUSE-SLE-SDK-12-SP1-2017-831,SUSE-SLE-SERVER-12-SP1-2017-831,SUSE-SLE-WE-12-SP1-2017-831", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1360-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1360-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171360-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1360-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1008842", "url": "https://bugzilla.suse.com/1008842" }, { "category": "self", "summary": "SUSE Bug 1009682", "url": "https://bugzilla.suse.com/1009682" }, { "category": "self", "summary": "SUSE Bug 1012620", "url": "https://bugzilla.suse.com/1012620" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1015703", "url": "https://bugzilla.suse.com/1015703" }, { "category": "self", "summary": "SUSE Bug 1015787", "url": "https://bugzilla.suse.com/1015787" }, { "category": "self", "summary": "SUSE Bug 1015821", "url": "https://bugzilla.suse.com/1015821" }, { "category": "self", "summary": "SUSE Bug 1017512", "url": "https://bugzilla.suse.com/1017512" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1018263", "url": "https://bugzilla.suse.com/1018263" }, { "category": "self", "summary": "SUSE Bug 1018419", "url": "https://bugzilla.suse.com/1018419" }, { "category": "self", "summary": "SUSE Bug 1018446", "url": "https://bugzilla.suse.com/1018446" }, { "category": "self", "summary": "SUSE Bug 1019168", "url": "https://bugzilla.suse.com/1019168" }, { "category": "self", "summary": "SUSE Bug 1019514", "url": "https://bugzilla.suse.com/1019514" }, { "category": "self", "summary": "SUSE Bug 1020048", "url": "https://bugzilla.suse.com/1020048" }, { "category": "self", "summary": "SUSE Bug 1020795", "url": "https://bugzilla.suse.com/1020795" }, { "category": "self", "summary": "SUSE Bug 1021256", "url": "https://bugzilla.suse.com/1021256" }, { "category": "self", "summary": "SUSE Bug 1021374", "url": "https://bugzilla.suse.com/1021374" }, { "category": "self", "summary": "SUSE Bug 1021762", "url": "https://bugzilla.suse.com/1021762" }, { "category": "self", "summary": "SUSE Bug 1021913", "url": "https://bugzilla.suse.com/1021913" }, { "category": "self", "summary": "SUSE Bug 1022559", "url": "https://bugzilla.suse.com/1022559" }, { "category": "self", "summary": "SUSE Bug 1022971", "url": "https://bugzilla.suse.com/1022971" }, { "category": "self", "summary": "SUSE Bug 1023164", "url": "https://bugzilla.suse.com/1023164" }, { "category": "self", "summary": "SUSE Bug 1023207", "url": "https://bugzilla.suse.com/1023207" }, { "category": "self", "summary": "SUSE Bug 1023377", "url": "https://bugzilla.suse.com/1023377" }, { "category": "self", "summary": "SUSE Bug 1023762", "url": "https://bugzilla.suse.com/1023762" }, { "category": "self", "summary": "SUSE Bug 1023824", "url": "https://bugzilla.suse.com/1023824" }, { "category": "self", "summary": "SUSE Bug 1023888", "url": "https://bugzilla.suse.com/1023888" }, { "category": "self", "summary": "SUSE Bug 1023992", "url": "https://bugzilla.suse.com/1023992" }, { "category": "self", "summary": "SUSE Bug 1024081", "url": "https://bugzilla.suse.com/1024081" }, { "category": "self", "summary": "SUSE Bug 1024234", "url": "https://bugzilla.suse.com/1024234" }, { "category": "self", "summary": "SUSE Bug 1024309", "url": "https://bugzilla.suse.com/1024309" }, { "category": "self", "summary": "SUSE Bug 1024508", "url": "https://bugzilla.suse.com/1024508" }, { "category": "self", "summary": "SUSE Bug 1024788", "url": "https://bugzilla.suse.com/1024788" }, { "category": "self", "summary": "SUSE Bug 1025039", "url": "https://bugzilla.suse.com/1025039" }, { "category": "self", "summary": "SUSE Bug 1025235", "url": "https://bugzilla.suse.com/1025235" }, { "category": "self", "summary": "SUSE Bug 1025354", "url": "https://bugzilla.suse.com/1025354" }, { "category": "self", "summary": "SUSE Bug 1025802", "url": "https://bugzilla.suse.com/1025802" }, { "category": "self", "summary": "SUSE Bug 1026024", "url": "https://bugzilla.suse.com/1026024" }, { "category": "self", "summary": "SUSE Bug 1026722", "url": "https://bugzilla.suse.com/1026722" }, { "category": "self", "summary": "SUSE Bug 1026914", "url": "https://bugzilla.suse.com/1026914" }, { "category": "self", "summary": "SUSE Bug 1027066", "url": "https://bugzilla.suse.com/1027066" }, { "category": "self", "summary": "SUSE Bug 1027178", "url": "https://bugzilla.suse.com/1027178" }, { "category": "self", "summary": "SUSE Bug 1027189", "url": "https://bugzilla.suse.com/1027189" }, { "category": "self", "summary": "SUSE Bug 1027190", "url": "https://bugzilla.suse.com/1027190" }, { "category": "self", "summary": "SUSE Bug 1027974", "url": "https://bugzilla.suse.com/1027974" }, { "category": "self", "summary": "SUSE Bug 1028041", "url": "https://bugzilla.suse.com/1028041" }, { "category": "self", "summary": "SUSE Bug 1028415", "url": "https://bugzilla.suse.com/1028415" }, { "category": "self", "summary": "SUSE Bug 1028595", "url": "https://bugzilla.suse.com/1028595" }, { "category": "self", "summary": "SUSE Bug 1028648", "url": "https://bugzilla.suse.com/1028648" }, { "category": "self", "summary": "SUSE Bug 1028895", "url": "https://bugzilla.suse.com/1028895" }, { "category": "self", "summary": "SUSE Bug 1029470", "url": "https://bugzilla.suse.com/1029470" }, { "category": "self", "summary": "SUSE Bug 1029850", "url": "https://bugzilla.suse.com/1029850" }, { "category": "self", "summary": "SUSE Bug 1029986", "url": "https://bugzilla.suse.com/1029986" }, { "category": "self", "summary": "SUSE Bug 1030118", "url": "https://bugzilla.suse.com/1030118" }, { "category": "self", "summary": "SUSE Bug 1030213", "url": "https://bugzilla.suse.com/1030213" }, { "category": "self", "summary": "SUSE Bug 1030593", "url": "https://bugzilla.suse.com/1030593" }, { "category": "self", "summary": "SUSE Bug 1030901", "url": "https://bugzilla.suse.com/1030901" }, { "category": "self", "summary": "SUSE Bug 1031003", "url": "https://bugzilla.suse.com/1031003" }, { "category": "self", "summary": "SUSE Bug 1031052", "url": "https://bugzilla.suse.com/1031052" }, { "category": "self", "summary": "SUSE Bug 1031080", "url": "https://bugzilla.suse.com/1031080" }, { "category": "self", "summary": "SUSE Bug 1031440", "url": "https://bugzilla.suse.com/1031440" }, { "category": "self", "summary": "SUSE Bug 1031567", "url": "https://bugzilla.suse.com/1031567" }, { "category": "self", "summary": "SUSE Bug 1031579", "url": "https://bugzilla.suse.com/1031579" }, { "category": "self", "summary": "SUSE Bug 1031662", "url": "https://bugzilla.suse.com/1031662" }, { "category": "self", "summary": "SUSE Bug 1031842", "url": "https://bugzilla.suse.com/1031842" }, { "category": "self", "summary": "SUSE Bug 1032125", "url": "https://bugzilla.suse.com/1032125" }, { "category": "self", "summary": "SUSE Bug 1032141", "url": "https://bugzilla.suse.com/1032141" }, { "category": "self", "summary": "SUSE Bug 1032344", "url": "https://bugzilla.suse.com/1032344" }, { "category": "self", "summary": "SUSE Bug 1032345", "url": "https://bugzilla.suse.com/1032345" }, { "category": "self", "summary": "SUSE Bug 1033336", "url": "https://bugzilla.suse.com/1033336" }, { "category": "self", "summary": "SUSE Bug 1034670", "url": "https://bugzilla.suse.com/1034670" }, { "category": "self", "summary": "SUSE Bug 103470", "url": "https://bugzilla.suse.com/103470" }, { "category": "self", "summary": "SUSE Bug 1034700", "url": "https://bugzilla.suse.com/1034700" }, { "category": "self", "summary": "SUSE Bug 1035576", "url": "https://bugzilla.suse.com/1035576" }, { "category": "self", "summary": "SUSE Bug 1035699", "url": "https://bugzilla.suse.com/1035699" }, { "category": "self", "summary": "SUSE Bug 1035738", "url": "https://bugzilla.suse.com/1035738" }, { "category": "self", "summary": "SUSE Bug 1035877", "url": "https://bugzilla.suse.com/1035877" }, { "category": "self", "summary": "SUSE Bug 1036752", "url": "https://bugzilla.suse.com/1036752" }, { "category": "self", "summary": "SUSE Bug 1038261", "url": "https://bugzilla.suse.com/1038261" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 857926", "url": "https://bugzilla.suse.com/857926" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 917630", "url": "https://bugzilla.suse.com/917630" }, { "category": "self", "summary": "SUSE Bug 922853", "url": "https://bugzilla.suse.com/922853" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 931620", "url": "https://bugzilla.suse.com/931620" }, { "category": "self", "summary": "SUSE Bug 937444", "url": "https://bugzilla.suse.com/937444" }, { "category": "self", "summary": "SUSE Bug 940946", "url": "https://bugzilla.suse.com/940946" }, { "category": "self", "summary": "SUSE Bug 954763", "url": "https://bugzilla.suse.com/954763" }, { "category": "self", "summary": "SUSE Bug 968697", "url": "https://bugzilla.suse.com/968697" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971933", "url": "https://bugzilla.suse.com/971933" }, { "category": "self", "summary": "SUSE Bug 979215", "url": "https://bugzilla.suse.com/979215" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983212", "url": "https://bugzilla.suse.com/983212" }, { "category": "self", "summary": "SUSE Bug 984530", "url": "https://bugzilla.suse.com/984530" }, { "category": "self", "summary": "SUSE Bug 985561", "url": "https://bugzilla.suse.com/985561" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989056", "url": "https://bugzilla.suse.com/989056" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10044 page", "url": "https://www.suse.com/security/cve/CVE-2016-10044/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10200 page", "url": "https://www.suse.com/security/cve/CVE-2016-10200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10208 page", "url": "https://www.suse.com/security/cve/CVE-2016-10208/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2117 page", "url": "https://www.suse.com/security/cve/CVE-2016-2117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3070 page", "url": "https://www.suse.com/security/cve/CVE-2016-3070/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5243 page", "url": "https://www.suse.com/security/cve/CVE-2016-5243/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9191 page", "url": "https://www.suse.com/security/cve/CVE-2016-9191/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9588 page", "url": "https://www.suse.com/security/cve/CVE-2016-9588/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9604 page", "url": "https://www.suse.com/security/cve/CVE-2016-9604/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2647 page", "url": "https://www.suse.com/security/cve/CVE-2017-2647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2671 page", "url": "https://www.suse.com/security/cve/CVE-2017-2671/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5669 page", "url": "https://www.suse.com/security/cve/CVE-2017-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5897 page", "url": "https://www.suse.com/security/cve/CVE-2017-5897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5986 page", "url": "https://www.suse.com/security/cve/CVE-2017-5986/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6074 page", "url": "https://www.suse.com/security/cve/CVE-2017-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6214 page", "url": "https://www.suse.com/security/cve/CVE-2017-6214/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6345 page", "url": "https://www.suse.com/security/cve/CVE-2017-6345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6346 page", "url": "https://www.suse.com/security/cve/CVE-2017-6346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6348 page", "url": "https://www.suse.com/security/cve/CVE-2017-6348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6353 page", "url": "https://www.suse.com/security/cve/CVE-2017-6353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6951 page", "url": "https://www.suse.com/security/cve/CVE-2017-6951/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7187 page", "url": "https://www.suse.com/security/cve/CVE-2017-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7261 page", "url": "https://www.suse.com/security/cve/CVE-2017-7261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7294 page", "url": "https://www.suse.com/security/cve/CVE-2017-7294/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7308 page", "url": "https://www.suse.com/security/cve/CVE-2017-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7616 page", "url": "https://www.suse.com/security/cve/CVE-2017-7616/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8106 page", "url": "https://www.suse.com/security/cve/CVE-2017-8106/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-05-19T12:12:38Z", "generator": { "date": "2017-05-19T12:12:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1360-1", "initial_release_date": "2017-05-19T12:12:38Z", "revision_history": [ { "date": "2017-05-19T12:12:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.40.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.40.1.noarch", "product_id": "kernel-source-3.12.74-60.64.40.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.40.4.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.40.4.noarch", "product_id": "kernel-docs-3.12.74-60.64.40.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.40.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.40.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.40.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.40.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.40.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.74-60.64.40.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch" }, "product_reference": "kernel-docs-3.12.74-60.64.40.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.40.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.74-60.64.40.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.74-60.64.40.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2016-10044", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10044" } ], "notes": [ { "category": "general", "text": "The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10044", "url": "https://www.suse.com/security/cve/CVE-2016-10044" }, { "category": "external", "summary": "SUSE Bug 1023992 for CVE-2016-10044", "url": "https://bugzilla.suse.com/1023992" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2016-10044" }, { "cve": "CVE-2016-10200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10200" } ], "notes": [ { "category": "general", "text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10200", "url": "https://www.suse.com/security/cve/CVE-2016-10200" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1028415 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1028415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-10200" }, { "cve": "CVE-2016-10208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10208" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10208", "url": "https://www.suse.com/security/cve/CVE-2016-10208" }, { "category": "external", "summary": "SUSE Bug 1023377 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1023377" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2016-10208", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-10208" }, { "cve": "CVE-2016-2117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2117" } ], "notes": [ { "category": "general", "text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2117", "url": "https://www.suse.com/security/cve/CVE-2016-2117" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-2117", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 968697 for CVE-2016-2117", "url": "https://bugzilla.suse.com/968697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2016-2117" }, { "cve": "CVE-2016-3070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3070" } ], "notes": [ { "category": "general", "text": "The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3070", "url": "https://www.suse.com/security/cve/CVE-2016-3070" }, { "category": "external", "summary": "SUSE Bug 979215 for CVE-2016-3070", "url": "https://bugzilla.suse.com/979215" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-3070" }, { "cve": "CVE-2016-5243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5243" } ], "notes": [ { "category": "general", "text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5243", "url": "https://www.suse.com/security/cve/CVE-2016-5243" }, { "category": "external", "summary": "SUSE Bug 983212 for CVE-2016-5243", "url": "https://bugzilla.suse.com/983212" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5243", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-5243" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-9191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9191" } ], "notes": [ { "category": "general", "text": "The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9191", "url": "https://www.suse.com/security/cve/CVE-2016-9191" }, { "category": "external", "summary": "SUSE Bug 1008842 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1008842" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1027179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-9191" }, { "cve": "CVE-2016-9588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9588" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9588", "url": "https://www.suse.com/security/cve/CVE-2016-9588" }, { "category": "external", "summary": "SUSE Bug 1015703 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1015703" }, { "category": "external", "summary": "SUSE Bug 1017512 for CVE-2016-9588", "url": "https://bugzilla.suse.com/1017512" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2016-9588" }, { "cve": "CVE-2016-9604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9604" } ], "notes": [ { "category": "general", "text": "It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as \u0027.dns_resolver\u0027 in RHEL-7 or \u0027.builtin_trusted_keys\u0027 upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9604", "url": "https://www.suse.com/security/cve/CVE-2016-9604" }, { "category": "external", "summary": "SUSE Bug 1035576 for CVE-2016-9604", "url": "https://bugzilla.suse.com/1035576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2016-9604" }, { "cve": "CVE-2017-2647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2647" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2647", "url": "https://www.suse.com/security/cve/CVE-2017-2647" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1030593" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-2647" }, { "cve": "CVE-2017-2671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2671" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2671", "url": "https://www.suse.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031003 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1031003" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-2671" }, { "cve": "CVE-2017-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5669" } ], "notes": [ { "category": "general", "text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5669", "url": "https://www.suse.com/security/cve/CVE-2017-5669" }, { "category": "external", "summary": "SUSE Bug 1026914 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1026914" }, { "category": "external", "summary": "SUSE Bug 1102390 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1102390" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-5669" }, { "cve": "CVE-2017-5897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5897" } ], "notes": [ { "category": "general", "text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5897", "url": "https://www.suse.com/security/cve/CVE-2017-5897" }, { "category": "external", "summary": "SUSE Bug 1023762 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1023762" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-5897" }, { "cve": "CVE-2017-5986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5986" } ], "notes": [ { "category": "general", "text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5986", "url": "https://www.suse.com/security/cve/CVE-2017-5986" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-5986" }, { "cve": "CVE-2017-6074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6074" } ], "notes": [ { "category": "general", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6074", "url": "https://www.suse.com/security/cve/CVE-2017-6074" }, { "category": "external", "summary": "SUSE Bug 1026024 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1026024" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1072204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-6074" }, { "cve": "CVE-2017-6214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6214" } ], "notes": [ { "category": "general", "text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6214", "url": "https://www.suse.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "SUSE Bug 1026722 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1026722" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6214" }, { "cve": "CVE-2017-6345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6345" } ], "notes": [ { "category": "general", "text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6345", "url": "https://www.suse.com/security/cve/CVE-2017-6345" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027190 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027190" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6345" }, { "cve": "CVE-2017-6346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6346" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6346", "url": "https://www.suse.com/security/cve/CVE-2017-6346" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027189 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027189" }, { "category": "external", "summary": "SUSE Bug 1064388 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064388" }, { "category": "external", "summary": "SUSE Bug 1064392 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-6346" }, { "cve": "CVE-2017-6348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6348" } ], "notes": [ { "category": "general", "text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6348", "url": "https://www.suse.com/security/cve/CVE-2017-6348" }, { "category": "external", "summary": "SUSE Bug 1027178 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1027178" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6348" }, { "cve": "CVE-2017-6353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6353" } ], "notes": [ { "category": "general", "text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6353", "url": "https://www.suse.com/security/cve/CVE-2017-6353" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6353" }, { "cve": "CVE-2017-6951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6951" } ], "notes": [ { "category": "general", "text": "The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \"dead\" type.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6951", "url": "https://www.suse.com/security/cve/CVE-2017-6951" }, { "category": "external", "summary": "SUSE Bug 1029850 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1029850" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1030593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-6951" }, { "cve": "CVE-2017-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7187" } ], "notes": [ { "category": "general", "text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7187", "url": "https://www.suse.com/security/cve/CVE-2017-7187" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1030213 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1030213" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7187" }, { "cve": "CVE-2017-7261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7261" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7261", "url": "https://www.suse.com/security/cve/CVE-2017-7261" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031052 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1031052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7261" }, { "cve": "CVE-2017-7294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7294" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7294", "url": "https://www.suse.com/security/cve/CVE-2017-7294" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031440 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031440" }, { "category": "external", "summary": "SUSE Bug 1031481 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031481" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7294" }, { "cve": "CVE-2017-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7308" } ], "notes": [ { "category": "general", "text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7308", "url": "https://www.suse.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031579 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031579" }, { "category": "external", "summary": "SUSE Bug 1031660 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031660" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7308" }, { "cve": "CVE-2017-7616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7616" } ], "notes": [ { "category": "general", "text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7616", "url": "https://www.suse.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "SUSE Bug 1033336 for CVE-2017-7616", "url": "https://bugzilla.suse.com/1033336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "moderate" } ], "title": "CVE-2017-7616" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8106" } ], "notes": [ { "category": "general", "text": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8106", "url": "https://www.suse.com/security/cve/CVE-2017-8106" }, { "category": "external", "summary": "SUSE Bug 1035877 for CVE-2017-8106", "url": "https://bugzilla.suse.com/1035877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-default-1-4.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_74-60_64_40-xen-1-4.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.40.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.74-60.64.40.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.74-60.64.40.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.74-60.64.40.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-05-19T12:12:38Z", "details": "low" } ], "title": "CVE-2017-8106" } ] }
suse-su-2017:2066-1
Vulnerability from csaf_suse
Published
2017-08-07 08:08
Modified
2017-08-07 08:08
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.59-92_24 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
The following non-security bug was fixed:
- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON's from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)
Patchnames
SUSE-SLE-Live-Patching-12-2017-1264
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_24 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n\nThe following non-security bug was fixed:\n\n- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON\u0027s from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1264", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2066-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2066-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172066-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2066-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1047518", "url": "https://bugzilla.suse.com/1047518" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:08:06Z", "generator": { "date": "2017-08-07T08:08:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2066-1", "initial_release_date": "2017-08-07T08:08:06Z", "revision_history": [ { "date": "2017-08-07T08:08:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_24-default-2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:08:06Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2100-1
Vulnerability from csaf_suse
Published
2017-08-08 11:31
Modified
2017-08-08 11:31
Summary
Security update for Linux Kernel Live Patch 21 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 21 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_72 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1302,SUSE-SLE-SERVER-12-2017-1302
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 21 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_72 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1302,SUSE-SLE-SERVER-12-2017-1302", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2100-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2100-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172100-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2100-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1044878", "url": "https://bugzilla.suse.com/1044878" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 21 for SLE 12", "tracking": { "current_release_date": "2017-08-08T11:31:47Z", "generator": { "date": "2017-08-08T11:31:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2100-1", "initial_release_date": "2017-08-08T11:31:47Z", "revision_history": [ { "date": "2017-08-08T11:31:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:47Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:47Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_72-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:47Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2046-1
Vulnerability from csaf_suse
Published
2017-08-04 15:15
Modified
2017-08-04 15:15
Summary
Security update for Linux Kernel Live Patch 8 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 8 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.59-92_20 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
The following non-security bug was fixed:
- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON's from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)
Patchnames
SUSE-SLE-Live-Patching-12-2017-1258
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.59-92_20 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n\nThe following non-security bug was fixed:\n\n- Fix for a btrfs deadlock between btrfs-cleaner and user space thread regression, which could cause spurious WARN_ON\u0027s from fs/btrfs/qgroup.c:1445 during patch application if BTRFS quota groups are enabled. (bsc#1047518)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1258", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2046-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2046-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172046-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2046-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1047518", "url": "https://bugzilla.suse.com/1047518" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 8 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-04T15:15:44Z", "generator": { "date": "2017-08-04T15:15:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2046-1", "initial_release_date": "2017-08-04T15:15:44Z", "revision_history": [ { "date": "2017-08-04T15:15:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64", "product_id": "kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_59-92_20-default-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-04T15:15:44Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2073-1
Vulnerability from csaf_suse
Published
2017-08-07 12:01
Modified
2017-08-07 12:01
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.67-60_64_24 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-SAP-12-SP1-2017-1275,SUSE-SLE-SERVER-12-SP1-2017-1275
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 11 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.67-60_64_24 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2017-1275,SUSE-SLE-SERVER-12-SP1-2017-1275", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2073-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2073-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172073-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2073-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 11 for SLE 12 SP1", "tracking": { "current_release_date": "2017-08-07T12:01:33Z", "generator": { "date": "2017-08-07T12:01:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2073-1", "initial_release_date": "2017-08-07T12:01:33Z", "revision_history": [ { "date": "2017-08-07T12:01:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:33Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:33Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:33Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:33Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-default-7-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_67-60_64_24-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T12:01:33Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2103-1
Vulnerability from csaf_suse
Published
2017-08-08 11:31
Modified
2017-08-08 11:31
Summary
Security update for Linux Kernel Live Patch 20 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 20 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.61-52_69 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
Patchnames
SUSE-SLE-SAP-12-2017-1303,SUSE-SLE-SERVER-12-2017-1303
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 20 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.61-52_69 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- A SUSE Linux Enterprise specific regression in tearing down network namespaces was fixed (bsc#1044878)\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2017-1303,SUSE-SLE-SERVER-12-2017-1303", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2103-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2103-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172103-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2103-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1044878", "url": "https://bugzilla.suse.com/1044878" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 20 for SLE 12", "tracking": { "current_release_date": "2017-08-08T11:31:56Z", "generator": { "date": "2017-08-08T11:31:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2103-1", "initial_release_date": "2017-08-08T11:31:56Z", "revision_history": [ { "date": "2017-08-08T11:31:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:56Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:56Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-default-4-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_69-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-08T11:31:56Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2017:2067-1
Vulnerability from csaf_suse
Published
2017-08-07 08:45
Modified
2017-08-07 08:45
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP2
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP2
Description of the patch
This update for the Linux Kernel 4.4.21-81 fixes several issues.
The following security bugs were fixed:
- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).
- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)
- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).
Patchnames
SUSE-SLE-Live-Patching-12-2017-1270
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP2", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 4.4.21-81 fixes several issues.\n\nThe following security bugs were fixed:\n\n- CVE-2017-7533: A bug in inotify code allowed local users to escalate privilege (bsc#1050751).\n- CVE-2017-8797: The NFSv4 server in the Linux kernel did not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system (bsc#1046202)\n- CVE-2017-7645: The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel allowed remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c (bsc#1046191).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bsc#1027575).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bsc#1042892).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bsc#1042364).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bsc#1038564).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2017-1270", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2067-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2067-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172067-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2067-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" }, { "category": "self", "summary": "SUSE Bug 1027575", "url": "https://bugzilla.suse.com/1027575" }, { "category": "self", "summary": "SUSE Bug 1038564", "url": "https://bugzilla.suse.com/1038564" }, { "category": "self", "summary": "SUSE Bug 1042364", "url": "https://bugzilla.suse.com/1042364" }, { "category": "self", "summary": "SUSE Bug 1042892", "url": "https://bugzilla.suse.com/1042892" }, { "category": "self", "summary": "SUSE Bug 1046191", "url": "https://bugzilla.suse.com/1046191" }, { "category": "self", "summary": "SUSE Bug 1046202", "url": "https://bugzilla.suse.com/1046202" }, { "category": "self", "summary": "SUSE Bug 1046206", "url": "https://bugzilla.suse.com/1046206" }, { "category": "self", "summary": "SUSE Bug 1050751", "url": "https://bugzilla.suse.com/1050751" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7645 page", "url": "https://www.suse.com/security/cve/CVE-2017-7645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8797 page", "url": "https://www.suse.com/security/cve/CVE-2017-8797/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP2", "tracking": { "current_release_date": "2017-08-07T08:45:30Z", "generator": { "date": "2017-08-07T08:45:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2067-1", "initial_release_date": "2017-08-07T08:45:30Z", "revision_history": [ { "date": "2017-08-07T08:45:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-4_4_21-81-default-8-2.1.x86_64", "product": { "name": "kgraft-patch-4_4_21-81-default-8-2.1.x86_64", "product_id": "kgraft-patch-4_4_21-81-default-8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_21-81-default-8-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" }, "product_reference": "kgraft-patch-4_4_21-81-default-8-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7645" } ], "notes": [ { "category": "general", "text": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7645", "url": "https://www.suse.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "SUSE Bug 1034670 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1034670" }, { "category": "external", "summary": "SUSE Bug 1036741 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1036741" }, { "category": "external", "summary": "SUSE Bug 1046191 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1046191" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-7645", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "important" } ], "title": "CVE-2017-7645" }, { "cve": "CVE-2017-8797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8797" } ], "notes": [ { "category": "general", "text": "The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8797", "url": "https://www.suse.com/security/cve/CVE-2017-8797" }, { "category": "external", "summary": "SUSE Bug 1046202 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046202" }, { "category": "external", "summary": "SUSE Bug 1046206 for CVE-2017-8797", "url": "https://bugzilla.suse.com/1046206" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "important" } ], "title": "CVE-2017-8797" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-4_4_21-81-default-8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-08-07T08:45:30Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
fkie_cve-2017-7645
Vulnerability from fkie_nvd
Published
2017-04-18 14:59
Modified
2025-04-20 01:37
Severity ?
Summary
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2017/dsa-3886 | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/97950 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1615 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1616 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1647 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:1319 | Third Party Advisory | |
cve@mitre.org | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e | Vendor Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e | Patch, Third Party Advisory | |
cve@mitre.org | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
cve@mitre.org | https://marc.info/?l=linux-nfs&m=149218228327497&w=2 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://marc.info/?l=linux-nfs&m=149247516212924&w=2 | Mailing List, Patch, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3754-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3886 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97950 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1615 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1616 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1647 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1319 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://marc.info/?l=linux-nfs&m=149218228327497&w=2 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://marc.info/?l=linux-nfs&m=149247516212924&w=2 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3754-1/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
canonical | ubuntu_linux | 14.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A5C1F01-214B-4477-A3A1-F6DF10181D3C", "versionEndExcluding": "3.2.89", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "314F9C88-C8E1-46EF-8119-538C824ED137", "versionEndExcluding": "3.10.107", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "75647580-464B-4AEF-8DE2-F17D1748F182", "versionEndExcluding": "3.12.74", "versionStartIncluding": "3.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A4478F-EC43-46DF-AE23-9298AE3F8892", "versionEndExcluding": "3.16.44", "versionStartIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8104AAC1-9700-4372-8E11-37B09309A76F", "versionEndExcluding": "3.18.52", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "70E79011-B658-40F2-B406-D3619DEBFACD", "versionEndExcluding": "4.1.40", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF5669AA-0250-493C-9D38-F0B563103943", "versionEndExcluding": "4.4.66", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "92A58CFB-13B7-4E99-8A14-A0308E4F126A", "versionEndExcluding": "4.9.26", "versionStartIncluding": "4.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "90895EF1-9DC7-4E47-A937-405661F7A44B", "versionEndExcluding": "4.10.14", "versionStartIncluding": "4.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c." }, { "lang": "es", "value": "El servidor NFSv2/NFSv3 en el subsistema nfsd en el Kernel de Linux hasta la versi\u00f3n 4.10.11 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de sistema) a trav\u00e9s de una respuesta RPC larga, relacionada con net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c y fs/nfsd/nfsxdr.c." } ], "id": "CVE-2017-7645", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-18T14:59:00.213", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97950" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3754-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3754-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2017:1615
Vulnerability from csaf_redhat
Published
2017-06-28 16:57
Modified
2025-08-03 17:28
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in
the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature were used together. A
remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel (denial of service). (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* The Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Ari Kauppi for reporting CVE-2017-7895 and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.
Bug Fix(es):
* Previously, the reserved-pages counter (HugePages_Rsvd) was bigger than the total-pages counter (HugePages_Total) in the /proc/meminfo file, and HugePages_Rsvd underflowed. With this update, the HugeTLB feature of the Linux kernel has been fixed, and HugePages_Rsvd underflow no longer occurs. (BZ#1445184)
* If a directory on a NFS client was modified while being listed, the NFS client could restart the directory listing multiple times. Consequently, the performance of listing the directory was sub-optimal. With this update, the restarting of the directory listing happens less frequently. As a result, the performance of listing the directory while it is being modified has improved. (BZ#1450851)
* The Fibre Channel over Ethernet (FCoE) adapter in some cases failed to reboot. This update fixes the qla2xxx driver, and FCoE adapter now reboots as expected. (BZ#1446246)
* When a VM with Virtual Function I/O (VFIO) device was rebooted, the QEMU process occasionally terminated unexpectedly due to a failed VFIO Direct Memory Access (DMA) map request. This update fixes the vfio driver and QEMU no longer crashes in the described situation. (BZ#1450855)
* When the operating system was booted with the in-box lpfc driver, a kernel panic occurred on the little-endian variant of IBM Power Systems. This update fixes lpfc, and the kernel no longer panics in the described situation. (BZ#1452044)
* When creating or destroying a VM with Virtual Function I/O (VFIO) devices with "Hugepages" feature enabled, errors in Direct Memory Access (DMA) page table entry (PTE) mappings occurred, and QEMU memory usage behaved unpredictably. This update fixes range computation when making room for large pages in Input/Output Memory Management Unit (IOMMU). As a result, errors in DMA PTE mappings no longer occur, and QEMU has a predictable memory usage in the described situation. (BZ#1450856)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in\nthe socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature were used together. A\nremote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel (denial of service). (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* The Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Ari Kauppi for reporting CVE-2017-7895 and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.\n\nBug Fix(es):\n\n* Previously, the reserved-pages counter (HugePages_Rsvd) was bigger than the total-pages counter (HugePages_Total) in the /proc/meminfo file, and HugePages_Rsvd underflowed. With this update, the HugeTLB feature of the Linux kernel has been fixed, and HugePages_Rsvd underflow no longer occurs. (BZ#1445184)\n\n* If a directory on a NFS client was modified while being listed, the NFS client could restart the directory listing multiple times. Consequently, the performance of listing the directory was sub-optimal. With this update, the restarting of the directory listing happens less frequently. As a result, the performance of listing the directory while it is being modified has improved. (BZ#1450851)\n\n* The Fibre Channel over Ethernet (FCoE) adapter in some cases failed to reboot. This update fixes the qla2xxx driver, and FCoE adapter now reboots as expected. (BZ#1446246)\n\n* When a VM with Virtual Function I/O (VFIO) device was rebooted, the QEMU process occasionally terminated unexpectedly due to a failed VFIO Direct Memory Access (DMA) map request. This update fixes the vfio driver and QEMU no longer crashes in the described situation. (BZ#1450855)\n\n* When the operating system was booted with the in-box lpfc driver, a kernel panic occurred on the little-endian variant of IBM Power Systems. This update fixes lpfc, and the kernel no longer panics in the described situation. (BZ#1452044)\n\n* When creating or destroying a VM with Virtual Function I/O (VFIO) devices with \"Hugepages\" feature enabled, errors in Direct Memory Access (DMA) page table entry (PTE) mappings occurred, and QEMU memory usage behaved unpredictably. This update fixes range computation when making room for large pages in Input/Output Memory Management Unit (IOMMU). As a result, errors in DMA PTE mappings no longer occur, and QEMU has a predictable memory usage in the described situation. (BZ#1450856)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1615", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3090941", "url": "https://access.redhat.com/articles/3090941" }, { "category": "external", "summary": "1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1615.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T17:28:53+00:00", "generator": { "date": "2025-08-03T17:28:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1615", "initial_release_date": "2017-06-28T16:57:35+00:00", "revision_history": [ { "date": "2017-06-28T16:57:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-29T12:41:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:28:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.26.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.26.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.26.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.26.1.el7.src", "product_id": "kernel-0:3.10.0-514.26.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.26.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.26.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.26.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64", "product_id": "perf-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.26.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.26.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "perf-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.26.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.26.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x", "product_id": "python-perf-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "perf-0:3.10.0-514.26.1.el7.s390x", "product_id": "perf-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.26.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.26.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.26.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.26.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xiaohan Zhang" ], "organization": "Huawei Inc." } ], "cve": "CVE-2017-2583", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1414735" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7\nmay address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "RHBZ#1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583" } ], "release_date": "2017-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1615" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest" }, { "cve": "CVE-2017-6214", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1426542" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "RHBZ#1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6214", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214" } ], "release_date": "2017-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1615" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()" }, { "cve": "CVE-2017-7477", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1445207" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 starting with the version kernel-3.10.0-514.el7, that is with Red Hat Enterprise Linux 7.3 GA. Prior Red Hat Enterprise Linux 7 kernel versions are not affected.\n\nIn order to exploit this issue, the system needs to be manually configured by privileged user. The default Red Hat Enterprise Linux 7 configuration is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7477" }, { "category": "external", "summary": "RHBZ#1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7477", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477" } ], "release_date": "2017-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "category": "workaround", "details": "Red Hat recommends blacklisting the kernel module to prevent its use. This will prevent accidental version loading by administration and also mitigate the flaw if a kernel with the affected module is booted.\n\nAs the macsec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nRaw\n\n # echo \"install macsec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-macsec.conf \n\nIf macsec functionality is in use as a functional part of the system a kernel upgrade is required.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1615" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1615" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Client-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Client-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7ComputeNode-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7ComputeNode-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Server-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Server-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.src", "7Workstation-optional-7.3.Z:kernel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-abi-whitelists-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-bootwrapper-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debug-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-s390x-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-debuginfo-common-x86_64-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-doc-0:3.10.0-514.26.1.el7.noarch", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-headers-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-kdump-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-kdump-devel-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:kernel-tools-libs-devel-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-0:3.10.0-514.26.1.el7.x86_64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.ppc64le", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.s390x", "7Workstation-optional-7.3.Z:python-perf-debuginfo-0:3.10.0-514.26.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" } ] }
rhsa-2017:1616
Vulnerability from csaf_redhat
Published
2017-06-28 16:57
Modified
2025-08-04 11:55
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)
* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)\n\n* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)\n\n* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1616", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "1452742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452742" }, { "category": "external", "summary": "1455239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455239" }, { "category": "external", "summary": "1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1616.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T11:55:31+00:00", "generator": { "date": "2025-08-04T11:55:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1616", "initial_release_date": "2017-06-28T16:57:58+00:00", "revision_history": [ { "date": "2017-06-28T16:57:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T16:57:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:55:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.26.1.rt56.442.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xiaohan Zhang" ], "organization": "Huawei Inc." } ], "cve": "CVE-2017-2583", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1414735" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7\nmay address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "RHBZ#1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583" } ], "release_date": "2017-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest" }, { "cve": "CVE-2017-6214", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1426542" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "RHBZ#1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6214", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214" } ], "release_date": "2017-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()" }, { "cve": "CVE-2017-7477", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1445207" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 starting with the version kernel-3.10.0-514.el7, that is with Red Hat Enterprise Linux 7.3 GA. Prior Red Hat Enterprise Linux 7 kernel versions are not affected.\n\nIn order to exploit this issue, the system needs to be manually configured by privileged user. The default Red Hat Enterprise Linux 7 configuration is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7477" }, { "category": "external", "summary": "RHBZ#1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7477", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477" } ], "release_date": "2017-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "workaround", "details": "Red Hat recommends blacklisting the kernel module to prevent its use. This will prevent accidental version loading by administration and also mitigate the flaw if a kernel with the affected module is booted.\n\nAs the macsec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nRaw\n\n # echo \"install macsec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-macsec.conf \n\nIf macsec functionality is in use as a functional part of the system a kernel upgrade is required.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2017-1000364", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1461333" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap/stack gap jumping via unbounded stack allocations", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "RHBZ#1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000364", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/stackguard", "url": "https://access.redhat.com/security/vulnerabilities/stackguard" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap/stack gap jumping via unbounded stack allocations" }, { "acknowledgments": [ { "names": [ "Qualys Inc" ] } ], "cve": "CVE-2017-1000379", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1462165" } ], "notes": [ { "category": "description", "text": "The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrectly mapped contents of PIE executable", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw. This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2. This issue is currently fixed in most versions of shipping products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000379" }, { "category": "external", "summary": "RHBZ#1462165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000379", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Incorrectly mapped contents of PIE executable" } ] }
rhsa-2018:1319
Vulnerability from csaf_redhat
Published
2018-05-08 19:04
Modified
2025-08-03 17:05
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)
* Kernel: error in exception handling leads to DoS (CVE-2018-8897)
* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)
* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)
* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)
* kernel: Stack information leak in the EFS element (CVE-2017-1000410)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.
Bug Fix(es):
These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, x86 32-bit)\n\n* Kernel: error in exception handling leads to DoS (CVE-2018-8897)\n\n* kernel: nfsd: Incorrect handling of long RPC replies (CVE-2017-7645)\n\n* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824)\n\n* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166)\n\n* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5754; Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897; Mohamed Ghannam for reporting CVE-2017-8824; and Armis Labs for reporting CVE-2017-1000410.\n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431591", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1319", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" }, { "category": "external", "summary": "https://access.redhat.com/articles/3431591", "url": "https://access.redhat.com/articles/3431591" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "1519591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "1531135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135" }, { "category": "external", "summary": "1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1319.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T17:05:26+00:00", "generator": { "date": "2025-08-03T17:05:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2018:1319", "initial_release_date": "2018-05-08T19:04:35+00:00", "revision_history": [ { "date": "2018-05-08T19:04:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-10T18:43:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:05:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.i686", "product": { "name": "perf-0:2.6.32-696.28.1.el6.i686", "product_id": "perf-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686", "product_id": "python-perf-0:2.6.32-696.28.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64", "product_id": "perf-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.src", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.src", "product_id": "kernel-0:2.6.32-696.28.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.28.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.28.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.28.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product_id": "python-perf-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "perf-0:2.6.32-696.28.1.el6.s390x", "product_id": "perf-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.28.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64", "product_id": "perf-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.28.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.28.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.src", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Mohamed Ghannam" ] } ], "cve": "CVE-2017-8824", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519591" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free vulnerability in DCCP socket", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, Red Hat Enterprise MRG 2 and real-time kernels. Future updates for the respective releases may address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "RHBZ#1519591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-8824", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8824" } ], "release_date": "2017-12-05T05:43:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free vulnerability in DCCP socket" }, { "cve": "CVE-2017-13166", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1548412" } ], "notes": [ { "category": "description", "text": "A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-13166" }, { "category": "external", "summary": "RHBZ#1548412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-13166", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13166" } ], "release_date": "2017-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "category": "workaround", "details": "A systemtap script intercepting v4l2_compat_ioctl32() function of the [videodev] module and making it to return -ENOIOCTLCMD error value would work just fine, except breaking all 32bit video capturing software, but not 64bit ones.\n\nAlternatively, blacklisting [videodev] module will work too, but it will break all video capturing software.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation" }, { "cve": "CVE-2017-18017", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2018-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1531135" } ], "notes": [ { "category": "description", "text": "The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18017" }, { "category": "external", "summary": "RHBZ#1531135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18017", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18017" } ], "release_date": "2018-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c" }, { "acknowledgments": [ { "names": [ "Armis Labs" ] } ], "cve": "CVE-2017-1000410", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519160" } ], "notes": [ { "category": "description", "text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack information leak in the EFS element", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000410" }, { "category": "external", "summary": "RHBZ#1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410" } ], "release_date": "2017-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Stack information leak in the EFS element" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-08T19:04:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1319" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.28.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.28.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.28.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2017:1647
Vulnerability from csaf_redhat
Published
2017-06-28 16:34
Modified
2025-08-04 11:55
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364 and Ari Kauppi for reporting CVE-2017-7895.
Bug Fix(es):
* kernel-rt packages have been upgraded to the 3.10.0-514 source tree, which provides a number of bug fixes over the previous version. (BZ#1452745)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364 and Ari Kauppi for reporting CVE-2017-7895.\n\nBug Fix(es):\n\n* kernel-rt packages have been upgraded to the 3.10.0-514 source tree, which provides a number of bug fixes over the previous version. (BZ#1452745)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1647", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "1452745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452745" }, { "category": "external", "summary": "1452769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452769" }, { "category": "external", "summary": "1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1647.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T11:55:36+00:00", "generator": { "date": "2025-08-04T11:55:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1647", "initial_release_date": "2017-06-28T16:34:27+00:00", "revision_history": [ { "date": "2017-06-28T16:34:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T16:34:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:55:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.rt56.228.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-514.rt56.228.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.rt56.228.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "product_id": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.rt56.228.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-6214", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1426542" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "RHBZ#1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6214", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214" } ], "release_date": "2017-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:34:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1647" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:34:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1647" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:34:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1647" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2017-1000364", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1461333" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap/stack gap jumping via unbounded stack allocations", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "RHBZ#1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000364", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/stackguard", "url": "https://access.redhat.com/security/vulnerabilities/stackguard" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:34:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1647" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap/stack gap jumping via unbounded stack allocations" }, { "acknowledgments": [ { "names": [ "Qualys Inc" ] } ], "cve": "CVE-2017-1000379", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1462165" } ], "notes": [ { "category": "description", "text": "The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrectly mapped contents of PIE executable", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw. This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2. This issue is currently fixed in most versions of shipping products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000379" }, { "category": "external", "summary": "RHBZ#1462165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000379", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:34:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1647" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-514.rt56.228.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.228.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-514.rt56.228.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Incorrectly mapped contents of PIE executable" } ] }
gsd-2017-7645
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-7645", "description": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "id": "GSD-2017-7645", "references": [ "https://www.suse.com/security/cve/CVE-2017-7645.html", "https://www.debian.org/security/2017/dsa-3886", "https://access.redhat.com/errata/RHSA-2018:1319", "https://access.redhat.com/errata/RHSA-2017:1647", "https://access.redhat.com/errata/RHSA-2017:1616", "https://access.redhat.com/errata/RHSA-2017:1615", "https://ubuntu.com/security/CVE-2017-7645", "https://advisories.mageia.org/CVE-2017-7645.html", "https://linux.oracle.com/cve/CVE-2017-7645.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7645" ], "details": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "id": "GSD-2017-7645", "modified": "2023-12-13T01:21:06.251247Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2", "refsource": "MISC", "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "USN-3754-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3754-1/" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "97950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97950" }, { "name": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2", "refsource": "MISC", "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "name": "DSA-3886", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.89", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.14", "versionStartIncluding": "4.10", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.40", "versionStartIncluding": "3.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.107", "versionStartIncluding": "3.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.18.52", "versionStartIncluding": "3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.66", "versionStartIncluding": "4.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.26", "versionStartIncluding": "4.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.12.74", "versionStartIncluding": "3.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.44", "versionStartIncluding": "3.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7645" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "name": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "name": "97950", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97950" }, { "name": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "name": "DSA-3886", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "RHSA-2018:1319", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "name": "USN-3754-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3754-1/" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-01-17T21:34Z", "publishedDate": "2017-04-18T14:59Z" } } }
ghsa-44rw-fxr4-98fp
Vulnerability from github
Published
2022-05-14 01:54
Modified
2025-04-20 03:36
Severity ?
VLAI Severity ?
Details
The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
{ "affected": [], "aliases": [ "CVE-2017-7645" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-04-18T14:59:00Z", "severity": "HIGH" }, "details": "The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.", "id": "GHSA-44rw-fxr4-98fp", "modified": "2025-04-20T03:36:16Z", "published": "2022-05-14T01:54:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6838a29ecb484c97e4efef9429643b9851fba6e" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "type": "WEB", "url": "https://marc.info/?l=linux-nfs\u0026m=149218228327497\u0026w=2" }, { "type": "WEB", "url": "https://marc.info/?l=linux-nfs\u0026m=149247516212924\u0026w=2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3754-1" }, { "type": "WEB", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97950" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…